Needed: A program that has the features of a trojan. Note: NOT A TROJAN. This software will not be used for illegal actions, or "Hacking into peoples computers". What is needed is a software that act's pretty much like the Sub7 or NetBus trojans. Features like:
Remote Connecting to an IP through Any Port.
Open an FTP on the remote computer.
Upload/Download/Delete/View All Files
Screenshot/Screen Capture w/ MouseClick Support
Get Cached Passwords w/ AIM/MSN Password Support
+etc.
Basically *ALL* the features that Sub7 has. The "server" file is to be undetectable, as it is not a virus. Also needed is a program that can change the "bytes" or "fragments of the code" and "file size" of the server, to make it undectable, EASILY.
Please see [login to view URL] and grab a copy of the latest SubSeven 2.2 and look at the features.
Again, this will not be used for "Hacking", this will be used by a closed group of people and their computers, for easy remote assistance and remote access. One more time; must have ALL the features of SubSeven 2.2, WORK (Meaning, be able to connect and have all features work), and come with a Undection software to make the server undectable if somehow the Norton team finds it to be a "Virus" even though this software will be used by a closed group, as said before, and NOT distrubuted.
This software must work for Windows XP, and be able to get around some/most firewalls. Since this is not a virus, the remote computer would like to leave Firewall up, and yet still have the software be able to connect.
Any questions, please post a comment , as I will be sure to answer them. Also please post a -fair- price.
## Deliverables
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request.
3) Complete ownership and distribution copyrights to all work purchased.
## Platform
All windows operating systems including XP. Ability to bypass firewalls.
## Deadline information
Must be completed by 10/31/02